?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
67b9cee7002813ce8f74873fd6d6bf8f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67b9cee7002813ce8f74873fd6d6bf8f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
67b9cee7002813ce8f74873fd6d6bf8f_JaffaCakes118
Size
96KB
MD5
67b9cee7002813ce8f74873fd6d6bf8f
SHA1
eff900dcd0d28acd41e74e15a0db37794221ae9a
SHA256
30e6f8ae35b53919177354d9c1471073f33f1dabb335167f4ffe198482fd6ec8
SHA512
2152135098bc5aabc45eaf76d6a541cafe2f9c156c5708742a77f8bcf1f667245be3fccf85ce1922999eccf09b235bc5f686f9397db64a1cb990ad9a35597e9e
SSDEEP
1536:vcB7ejYKPNezjO8jpz5NkXsZsheJRADIxtBbvpBCOmXx79jwqeGdgGf6kOsyetK6:vcLVjO8jpz5NkXsZsiADIRbxBCOyh9Hq
Checks for missing Authenticode signature.
resource |
---|
67b9cee7002813ce8f74873fd6d6bf8f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleBaseNameA
GetProcessHeap
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualFree
GetCurrentProcess
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
CreateFileA
GetFileSize
HeapAlloc
VirtualQuery
HeapFree
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowRect
DestroyWindow
SetWindowTextA
UpdateWindow
SetScrollInfo
ModifyMenuA
GetActiveWindow
DrawTextA
GetWindowInfo
ReleaseDC
SetWindowPos
MoveWindow
FindWindowA
GetDC
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ